1 | /* |
2 | * IDENTIFICATION: |
3 | * stub generated Tue Apr 9 11:33:41 2019 |
4 | * with a MiG generated by bootstrap_cmds-96.20.2.200.4 |
5 | * OPTIONS: |
6 | * KernelServer |
7 | */ |
8 | |
9 | /* Module host_security */ |
10 | |
11 | #define __MIG_check__Request__host_security_subsystem__ 1 |
12 | |
13 | #include "host_security_server.h" |
14 | |
15 | #ifndef mig_internal |
16 | #define mig_internal static __inline__ |
17 | #endif /* mig_internal */ |
18 | |
19 | #ifndef mig_external |
20 | #define mig_external |
21 | #endif /* mig_external */ |
22 | |
23 | #if !defined(__MigTypeCheck) && defined(TypeCheck) |
24 | #define __MigTypeCheck TypeCheck /* Legacy setting */ |
25 | #endif /* !defined(__MigTypeCheck) */ |
26 | |
27 | #if !defined(__MigKernelSpecificCode) && defined(_MIG_KERNEL_SPECIFIC_CODE_) |
28 | #define __MigKernelSpecificCode _MIG_KERNEL_SPECIFIC_CODE_ /* Legacy setting */ |
29 | #endif /* !defined(__MigKernelSpecificCode) */ |
30 | |
31 | #ifndef LimitCheck |
32 | #define LimitCheck 0 |
33 | #endif /* LimitCheck */ |
34 | |
35 | #ifndef min |
36 | #define min(a,b) ( ((a) < (b))? (a): (b) ) |
37 | #endif /* min */ |
38 | |
39 | #if !defined(_WALIGN_) |
40 | #define _WALIGN_(x) (((x) + 3) & ~3) |
41 | #endif /* !defined(_WALIGN_) */ |
42 | |
43 | #if !defined(_WALIGNSZ_) |
44 | #define _WALIGNSZ_(x) _WALIGN_(sizeof(x)) |
45 | #endif /* !defined(_WALIGNSZ_) */ |
46 | |
47 | #ifndef UseStaticTemplates |
48 | #define UseStaticTemplates 0 |
49 | #endif /* UseStaticTemplates */ |
50 | |
51 | #ifndef __DeclareRcvRpc |
52 | #define __DeclareRcvRpc(_NUM_, _NAME_) |
53 | #endif /* __DeclareRcvRpc */ |
54 | |
55 | #ifndef __BeforeRcvRpc |
56 | #define __BeforeRcvRpc(_NUM_, _NAME_) |
57 | #endif /* __BeforeRcvRpc */ |
58 | |
59 | #ifndef __AfterRcvRpc |
60 | #define __AfterRcvRpc(_NUM_, _NAME_) |
61 | #endif /* __AfterRcvRpc */ |
62 | |
63 | #ifndef __DeclareRcvSimple |
64 | #define __DeclareRcvSimple(_NUM_, _NAME_) |
65 | #endif /* __DeclareRcvSimple */ |
66 | |
67 | #ifndef __BeforeRcvSimple |
68 | #define __BeforeRcvSimple(_NUM_, _NAME_) |
69 | #endif /* __BeforeRcvSimple */ |
70 | |
71 | #ifndef __AfterRcvSimple |
72 | #define __AfterRcvSimple(_NUM_, _NAME_) |
73 | #endif /* __AfterRcvSimple */ |
74 | |
75 | #define novalue void |
76 | |
77 | #if __MigKernelSpecificCode |
78 | #define msgh_request_port msgh_remote_port |
79 | #define MACH_MSGH_BITS_REQUEST(bits) MACH_MSGH_BITS_REMOTE(bits) |
80 | #define msgh_reply_port msgh_local_port |
81 | #define MACH_MSGH_BITS_REPLY(bits) MACH_MSGH_BITS_LOCAL(bits) |
82 | #else |
83 | #define msgh_request_port msgh_local_port |
84 | #define MACH_MSGH_BITS_REQUEST(bits) MACH_MSGH_BITS_LOCAL(bits) |
85 | #define msgh_reply_port msgh_remote_port |
86 | #define MACH_MSGH_BITS_REPLY(bits) MACH_MSGH_BITS_REMOTE(bits) |
87 | #endif /* __MigKernelSpecificCode */ |
88 | |
89 | #define MIG_RETURN_ERROR(X, code) {\ |
90 | ((mig_reply_error_t *)X)->RetCode = code;\ |
91 | ((mig_reply_error_t *)X)->NDR = NDR_record;\ |
92 | return;\ |
93 | } |
94 | |
95 | /* Forward Declarations */ |
96 | |
97 | |
98 | mig_internal novalue _Xhost_security_create_task_token |
99 | (mach_msg_header_t *InHeadP, mach_msg_header_t *OutHeadP); |
100 | |
101 | mig_internal novalue _Xhost_security_set_task_token |
102 | (mach_msg_header_t *InHeadP, mach_msg_header_t *OutHeadP); |
103 | |
104 | |
105 | #if ( __MigTypeCheck ) |
106 | #if __MIG_check__Request__host_security_subsystem__ |
107 | #if !defined(__MIG_check__Request__host_security_create_task_token_t__defined) |
108 | #define __MIG_check__Request__host_security_create_task_token_t__defined |
109 | |
110 | mig_internal kern_return_t __MIG_check__Request__host_security_create_task_token_t(__attribute__((__unused__)) __Request__host_security_create_task_token_t *In0P) |
111 | { |
112 | |
113 | typedef __Request__host_security_create_task_token_t __Request; |
114 | #if __MigTypeCheck |
115 | if (!(In0P->Head.msgh_bits & MACH_MSGH_BITS_COMPLEX) || |
116 | (In0P->msgh_body.msgh_descriptor_count != 3) || |
117 | (In0P->Head.msgh_size != (mach_msg_size_t)sizeof(__Request))) |
118 | return MIG_BAD_ARGUMENTS; |
119 | #endif /* __MigTypeCheck */ |
120 | |
121 | #if __MigTypeCheck |
122 | if (In0P->parent_task.type != MACH_MSG_PORT_DESCRIPTOR || |
123 | In0P->parent_task.disposition != 17) |
124 | return MIG_TYPE_ERROR; |
125 | #endif /* __MigTypeCheck */ |
126 | |
127 | #if __MigTypeCheck |
128 | if (In0P->host.type != MACH_MSG_PORT_DESCRIPTOR || |
129 | In0P->host.disposition != 17) |
130 | return MIG_TYPE_ERROR; |
131 | #endif /* __MigTypeCheck */ |
132 | |
133 | #if __MigTypeCheck |
134 | if (In0P->ledgers.type != MACH_MSG_OOL_PORTS_DESCRIPTOR || |
135 | In0P->ledgers.disposition != 17) |
136 | return MIG_TYPE_ERROR; |
137 | #endif /* __MigTypeCheck */ |
138 | |
139 | return MACH_MSG_SUCCESS; |
140 | } |
141 | #endif /* !defined(__MIG_check__Request__host_security_create_task_token_t__defined) */ |
142 | #endif /* __MIG_check__Request__host_security_subsystem__ */ |
143 | #endif /* ( __MigTypeCheck ) */ |
144 | |
145 | |
146 | /* Routine host_security_create_task_token */ |
147 | mig_internal novalue _Xhost_security_create_task_token |
148 | (mach_msg_header_t *InHeadP, mach_msg_header_t *OutHeadP) |
149 | { |
150 | |
151 | #ifdef __MigPackStructs |
152 | #pragma pack(4) |
153 | #endif |
154 | typedef struct { |
155 | mach_msg_header_t Head; |
156 | /* start of the kernel processed data */ |
157 | mach_msg_body_t msgh_body; |
158 | mach_msg_port_descriptor_t parent_task; |
159 | mach_msg_port_descriptor_t host; |
160 | mach_msg_ool_ports_descriptor_t ledgers; |
161 | /* end of the kernel processed data */ |
162 | NDR_record_t NDR; |
163 | security_token_t sec_token; |
164 | audit_token_t audit_token; |
165 | mach_msg_type_number_t ledgersCnt; |
166 | boolean_t inherit_memory; |
167 | mach_msg_trailer_t trailer; |
168 | } Request __attribute__((unused)); |
169 | #ifdef __MigPackStructs |
170 | #pragma pack() |
171 | #endif |
172 | typedef __Request__host_security_create_task_token_t __Request; |
173 | typedef __Reply__host_security_create_task_token_t Reply __attribute__((unused)); |
174 | |
175 | /* |
176 | * typedef struct { |
177 | * mach_msg_header_t Head; |
178 | * NDR_record_t NDR; |
179 | * kern_return_t RetCode; |
180 | * } mig_reply_error_t; |
181 | */ |
182 | |
183 | Request *In0P = (Request *) InHeadP; |
184 | Reply *OutP = (Reply *) OutHeadP; |
185 | #ifdef __MIG_check__Request__host_security_create_task_token_t__defined |
186 | kern_return_t check_result; |
187 | #endif /* __MIG_check__Request__host_security_create_task_token_t__defined */ |
188 | |
189 | #if __MigKernelSpecificCode |
190 | #if UseStaticTemplates |
191 | const static mach_msg_port_descriptor_t child_taskTemplate = { |
192 | /* name = */ MACH_PORT_NULL, |
193 | /* pad1 = */ 0, |
194 | /* pad2 = */ 0, |
195 | /* disp = */ 17, |
196 | /* type = */ MACH_MSG_PORT_DESCRIPTOR, |
197 | }; |
198 | #endif /* UseStaticTemplates */ |
199 | |
200 | #else |
201 | #if UseStaticTemplates |
202 | const static mach_msg_port_descriptor_t child_taskTemplate = { |
203 | /* name = */ MACH_PORT_NULL, |
204 | /* pad1 = */ 0, |
205 | /* pad2 = */ 0, |
206 | /* disp = */ 19, |
207 | /* type = */ MACH_MSG_PORT_DESCRIPTOR, |
208 | }; |
209 | #endif /* UseStaticTemplates */ |
210 | |
211 | #endif /* __MigKernelSpecificCode */ |
212 | kern_return_t RetCode; |
213 | task_t parent_task; |
214 | task_t child_task; |
215 | |
216 | __DeclareRcvRpc(600, "host_security_create_task_token" ) |
217 | __BeforeRcvRpc(600, "host_security_create_task_token" ) |
218 | |
219 | #if defined(__MIG_check__Request__host_security_create_task_token_t__defined) |
220 | check_result = __MIG_check__Request__host_security_create_task_token_t((__Request *)In0P); |
221 | if (check_result != MACH_MSG_SUCCESS) |
222 | { MIG_RETURN_ERROR(OutP, check_result); } |
223 | #endif /* defined(__MIG_check__Request__host_security_create_task_token_t__defined) */ |
224 | |
225 | #if UseStaticTemplates |
226 | OutP->child_task = child_taskTemplate; |
227 | #else /* UseStaticTemplates */ |
228 | #if __MigKernelSpecificCode |
229 | OutP->child_task.disposition = 17; |
230 | #else |
231 | OutP->child_task.disposition = 19; |
232 | #endif /* __MigKernelSpecificCode */ |
233 | #if !(defined(KERNEL) && defined(__LP64__)) |
234 | OutP->child_task.pad1 = 0; |
235 | #endif |
236 | OutP->child_task.pad2 = 0; |
237 | OutP->child_task.type = MACH_MSG_PORT_DESCRIPTOR; |
238 | #if defined(KERNEL) |
239 | OutP->child_task.pad_end = 0; |
240 | #endif |
241 | #endif /* UseStaticTemplates */ |
242 | |
243 | |
244 | parent_task = convert_port_to_task(In0P->parent_task.name); |
245 | |
246 | RetCode = host_security_create_task_token(convert_port_to_host_security(In0P->Head.msgh_request_port), parent_task, In0P->sec_token, In0P->audit_token, convert_port_to_host(In0P->host.name), (ledger_array_t)(In0P->ledgers.address), In0P->ledgers.count, In0P->inherit_memory, &child_task); |
247 | task_deallocate(parent_task); |
248 | if (RetCode != KERN_SUCCESS) { |
249 | MIG_RETURN_ERROR(OutP, RetCode); |
250 | } |
251 | #if __MigKernelSpecificCode |
252 | |
253 | if (IP_VALID((ipc_port_t)In0P->host.name)) |
254 | ipc_port_release_send((ipc_port_t)In0P->host.name); |
255 | |
256 | if (IP_VALID((ipc_port_t)In0P->parent_task.name)) |
257 | ipc_port_release_send((ipc_port_t)In0P->parent_task.name); |
258 | #endif /* __MigKernelSpecificCode */ |
259 | OutP->child_task.name = (mach_port_t)convert_task_to_port(child_task); |
260 | |
261 | |
262 | OutP->Head.msgh_bits |= MACH_MSGH_BITS_COMPLEX; |
263 | OutP->Head.msgh_size = (mach_msg_size_t)(sizeof(Reply)); |
264 | OutP->msgh_body.msgh_descriptor_count = 1; |
265 | __AfterRcvRpc(600, "host_security_create_task_token" ) |
266 | } |
267 | |
268 | #if ( __MigTypeCheck ) |
269 | #if __MIG_check__Request__host_security_subsystem__ |
270 | #if !defined(__MIG_check__Request__host_security_set_task_token_t__defined) |
271 | #define __MIG_check__Request__host_security_set_task_token_t__defined |
272 | |
273 | mig_internal kern_return_t __MIG_check__Request__host_security_set_task_token_t(__attribute__((__unused__)) __Request__host_security_set_task_token_t *In0P) |
274 | { |
275 | |
276 | typedef __Request__host_security_set_task_token_t __Request; |
277 | #if __MigTypeCheck |
278 | if (!(In0P->Head.msgh_bits & MACH_MSGH_BITS_COMPLEX) || |
279 | (In0P->msgh_body.msgh_descriptor_count != 2) || |
280 | (In0P->Head.msgh_size != (mach_msg_size_t)sizeof(__Request))) |
281 | return MIG_BAD_ARGUMENTS; |
282 | #endif /* __MigTypeCheck */ |
283 | |
284 | #if __MigTypeCheck |
285 | if (In0P->target_task.type != MACH_MSG_PORT_DESCRIPTOR || |
286 | In0P->target_task.disposition != 17) |
287 | return MIG_TYPE_ERROR; |
288 | #endif /* __MigTypeCheck */ |
289 | |
290 | #if __MigTypeCheck |
291 | if (In0P->host.type != MACH_MSG_PORT_DESCRIPTOR || |
292 | In0P->host.disposition != 17) |
293 | return MIG_TYPE_ERROR; |
294 | #endif /* __MigTypeCheck */ |
295 | |
296 | return MACH_MSG_SUCCESS; |
297 | } |
298 | #endif /* !defined(__MIG_check__Request__host_security_set_task_token_t__defined) */ |
299 | #endif /* __MIG_check__Request__host_security_subsystem__ */ |
300 | #endif /* ( __MigTypeCheck ) */ |
301 | |
302 | |
303 | /* Routine host_security_set_task_token */ |
304 | mig_internal novalue _Xhost_security_set_task_token |
305 | (mach_msg_header_t *InHeadP, mach_msg_header_t *OutHeadP) |
306 | { |
307 | |
308 | #ifdef __MigPackStructs |
309 | #pragma pack(4) |
310 | #endif |
311 | typedef struct { |
312 | mach_msg_header_t Head; |
313 | /* start of the kernel processed data */ |
314 | mach_msg_body_t msgh_body; |
315 | mach_msg_port_descriptor_t target_task; |
316 | mach_msg_port_descriptor_t host; |
317 | /* end of the kernel processed data */ |
318 | NDR_record_t NDR; |
319 | security_token_t sec_token; |
320 | audit_token_t audit_token; |
321 | mach_msg_trailer_t trailer; |
322 | } Request __attribute__((unused)); |
323 | #ifdef __MigPackStructs |
324 | #pragma pack() |
325 | #endif |
326 | typedef __Request__host_security_set_task_token_t __Request; |
327 | typedef __Reply__host_security_set_task_token_t Reply __attribute__((unused)); |
328 | |
329 | /* |
330 | * typedef struct { |
331 | * mach_msg_header_t Head; |
332 | * NDR_record_t NDR; |
333 | * kern_return_t RetCode; |
334 | * } mig_reply_error_t; |
335 | */ |
336 | |
337 | Request *In0P = (Request *) InHeadP; |
338 | Reply *OutP = (Reply *) OutHeadP; |
339 | #ifdef __MIG_check__Request__host_security_set_task_token_t__defined |
340 | kern_return_t check_result; |
341 | #endif /* __MIG_check__Request__host_security_set_task_token_t__defined */ |
342 | |
343 | #if __MigKernelSpecificCode |
344 | #else |
345 | #endif /* __MigKernelSpecificCode */ |
346 | task_t target_task; |
347 | |
348 | __DeclareRcvRpc(601, "host_security_set_task_token" ) |
349 | __BeforeRcvRpc(601, "host_security_set_task_token" ) |
350 | |
351 | #if defined(__MIG_check__Request__host_security_set_task_token_t__defined) |
352 | check_result = __MIG_check__Request__host_security_set_task_token_t((__Request *)In0P); |
353 | if (check_result != MACH_MSG_SUCCESS) |
354 | { MIG_RETURN_ERROR(OutP, check_result); } |
355 | #endif /* defined(__MIG_check__Request__host_security_set_task_token_t__defined) */ |
356 | |
357 | target_task = convert_port_to_task(In0P->target_task.name); |
358 | |
359 | OutP->RetCode = host_security_set_task_token(convert_port_to_host_security(In0P->Head.msgh_request_port), target_task, In0P->sec_token, In0P->audit_token, convert_port_to_host(In0P->host.name)); |
360 | task_deallocate(target_task); |
361 | #if __MigKernelSpecificCode |
362 | if (OutP->RetCode != KERN_SUCCESS) { |
363 | MIG_RETURN_ERROR(OutP, OutP->RetCode); |
364 | } |
365 | |
366 | if (IP_VALID((ipc_port_t)In0P->host.name)) |
367 | ipc_port_release_send((ipc_port_t)In0P->host.name); |
368 | |
369 | if (IP_VALID((ipc_port_t)In0P->target_task.name)) |
370 | ipc_port_release_send((ipc_port_t)In0P->target_task.name); |
371 | #endif /* __MigKernelSpecificCode */ |
372 | |
373 | OutP->NDR = NDR_record; |
374 | |
375 | |
376 | __AfterRcvRpc(601, "host_security_set_task_token" ) |
377 | } |
378 | |
379 | |
380 | |
381 | /* Description of this subsystem, for use in direct RPC */ |
382 | const struct host_security_subsystem host_security_subsystem = { |
383 | host_security_server_routine, |
384 | 600, |
385 | 602, |
386 | (mach_msg_size_t)sizeof(union __ReplyUnion__host_security_subsystem), |
387 | (vm_address_t)0, |
388 | { |
389 | { (mig_impl_routine_t) 0, |
390 | (mig_stub_routine_t) _Xhost_security_create_task_token, 17, 0, (routine_arg_descriptor_t)0, (mach_msg_size_t)sizeof(__Reply__host_security_create_task_token_t)}, |
391 | { (mig_impl_routine_t) 0, |
392 | (mig_stub_routine_t) _Xhost_security_set_task_token, 13, 0, (routine_arg_descriptor_t)0, (mach_msg_size_t)sizeof(__Reply__host_security_set_task_token_t)}, |
393 | } |
394 | }; |
395 | |
396 | mig_external boolean_t host_security_server |
397 | (mach_msg_header_t *InHeadP, mach_msg_header_t *OutHeadP) |
398 | { |
399 | /* |
400 | * typedef struct { |
401 | * mach_msg_header_t Head; |
402 | * NDR_record_t NDR; |
403 | * kern_return_t RetCode; |
404 | * } mig_reply_error_t; |
405 | */ |
406 | |
407 | register mig_routine_t routine; |
408 | |
409 | OutHeadP->msgh_bits = MACH_MSGH_BITS(MACH_MSGH_BITS_REPLY(InHeadP->msgh_bits), 0); |
410 | OutHeadP->msgh_remote_port = InHeadP->msgh_reply_port; |
411 | /* Minimal size: routine() will update it if different */ |
412 | OutHeadP->msgh_size = (mach_msg_size_t)sizeof(mig_reply_error_t); |
413 | OutHeadP->msgh_local_port = MACH_PORT_NULL; |
414 | OutHeadP->msgh_id = InHeadP->msgh_id + 100; |
415 | OutHeadP->msgh_reserved = 0; |
416 | |
417 | if ((InHeadP->msgh_id > 601) || (InHeadP->msgh_id < 600) || |
418 | ((routine = host_security_subsystem.routine[InHeadP->msgh_id - 600].stub_routine) == 0)) { |
419 | ((mig_reply_error_t *)OutHeadP)->NDR = NDR_record; |
420 | ((mig_reply_error_t *)OutHeadP)->RetCode = MIG_BAD_ID; |
421 | return FALSE; |
422 | } |
423 | (*routine) (InHeadP, OutHeadP); |
424 | return TRUE; |
425 | } |
426 | |
427 | mig_external mig_routine_t host_security_server_routine |
428 | (mach_msg_header_t *InHeadP) |
429 | { |
430 | register int msgh_id; |
431 | |
432 | msgh_id = InHeadP->msgh_id - 600; |
433 | |
434 | if ((msgh_id > 1) || (msgh_id < 0)) |
435 | return 0; |
436 | |
437 | return host_security_subsystem.routine[msgh_id].stub_routine; |
438 | } |
439 | |